Transmittal Letter Objectives and Scope Approach Financial System Permitting Application... 9

Size: px
Start display at page:

Download "Transmittal Letter... 1. Objectives and Scope... 2. Approach... 3-7. Financial System... 8. Permitting Application... 9"

Transcription

1 Internal Audit Committee of Information Technology Risk Assessment Public Report Prepared By: Internal Auditors of Brevard County September 30, 2009

2 Table of Contents Transmittal Letter... 1 Objectives and Scope... 2 Approach Risk Assessment: Financial System... 8 Permitting Application... 9 Solid Waste Management Application Library Information Systems Application Utility Services Work Management Application... 12

3 September 30, 2009 The Audit Committee of Viera, Florida Pursuant to the approved internal audit plan, we hereby submit our internal audit report covering information technology (IT) risk assessment for (the County ). Through our knowledge and discussions with management, the certain IT systems were identified for an initial enterprise-wide risk assessment. This focused IT risk assessment was conducted by applying both a data security and business view of IT risk. The subject matter covered under this audit is confidential in nature, and thus specific details of any deficiencies are not disclosed to avoid the possibility of compromising County information and security. This exemption from Florida Statutes (1) and and other laws and rules requiring public access or disclosure is addressed under Florida Statute , Security systems; records and meetings exempt from public access or disclosure. We will be presenting this public report to the Audit Committee at the next scheduled meeting and all confidential matters will be communicated with appropriate personnel at the County. Our IT risk assessment methodology includes using National Institute of Science and Technology (NIST) 1 qualitative and quantitative risk assessment and other industry-accepted methodologies. Specifically, the risk assessment focuses on the data risk factors and effectiveness of Committee of Sponsoring Organizations (COSO) and Control Objectives for Information-related Technologies (CobIT) control framework elements employed to mitigate these data risks, as follows: Data risk elements (inherent risk in the absence of controls) - External market reputation - Financial - Operational/reliability and maintainability - Legal/regulatory - Strategic - Technology/systems - People/culture - Fraud Mitigating COSO-based controls (control design adequacy) - Monitoring - Information and communication - Risk assessment - Control activities preventive controls - Control environment Tone at the Top Residual risk (inherent risk design adequacy of controls = residual risk) While we obtained an understanding of the controls in place in order to assess the risks, our approach did not include testing the existing controls of these systems. To further enhance the value of this risk assessment process, the internal auditors facilitated key control identifications for these systems through the use of control self assessments (CSA s). This included documenting each of these systems specific risks controls and performing transaction walkthroughs as appropriate to provide management with the process documentation needed for ongoing risk assessment and control design evaluation. We would like to thank the IT department, Planning and Zoning, Library Services, Utility Services, and Solid Waste Management in assisting with this IT risk assessment. Sincerely, INTERNAL AUDITORS 1 NIST SPECIAL PUBLICATION , RISK MANAGEMENT GUIDE FOR INFORMATION TECHNOLOGY SYSTEMS, DATED JULY 2002 Page 1

4 Objectives and Scope Objectives Every entity faces a variety of risks from external and internal sources that must be assessed. Risk assessment is the identification and analysis of relevant risks to achievement of business objectives, forming a basis for determining how the risks should be managed. Because economic, industry, regulatory and operating conditions will continue to change, mechanisms are needed to identify and deal with the special risks associated with change. Risk assessment should be performed as an on-going process. The purpose of the Information Technology Risk Assessment was to assist management at the County with identifying and documenting the risks associated with critical applications to ensure there is a solid foundation for management to develop a strategy and operational plan for managing those risks. The performance of these risk assessments will facilitate not only the refinement and, if needed, development of key internal controls, but also enable the County to further establish a broad-based service-level management process based on specific risk criteria. As such, we will continue to include IT risk assessments in our proposed future internal audit plans. A risk assessment does not include detailed testing of the controls in place. To further enhance the value of this risk assessment, we will be documenting each of these systems specific risks and controls and performing transaction walkthroughs as appropriate to provide management with the process documentation needed for ongoing risk assessment and control design evaluation. Scope During the past year, the information technology department (ITD) has performed risk assessments for IT facilities, internet connections and 911 operations. In addition to these areas, management identified other high-risk IT systems that should be included in the initial enterprise-wide risk assessment of critical systems. In order to facilitate and assist management with the completion of the risk assessment, we planned the scope and extent of procedures based on County management s, as well as our own understanding of the criticality associated with the applications data and business operations, and regulatory compliance. It should be noted the risk assessments are of the systems and/or applications and not necessarily the departments or agencies that use or develop them. Specifically, ITD identified that including the following systems or functions in the County s initial enterprise-wide risk assessment would bring the greatest benefit to the County s security program management process: Financial system - This application suite is the primary financial management and reporting application for the County. The system was the focus of a security review in 2008, with one remaining follow-up issue related to security policies. Permitting application - This application is the primary software utilized to track the approval process for permits, developments and contractor licenses. Additionally, it is used to track the enforcement process for code and contractor violations. Solid Waste Management Department (SWMD) application - SWMD is responsible for the operation of the County s landfills to provide for the disposal of solid waste that is generated from households and commercial businesses in Brevard County. SWMD will bill for collection and disposal charges for garbage, yard waste and recycling, as well as other services. Library Information Systems application - The Integrated Library Systems (ILS) is used to manage library business. Utility Services application - This application is a complete work management system for Brevard County wastewater operations. It helps to automate the current manual processes and will support the management of work flow processes, assist with FEMA reporting, track and report DEP malfunction reports, and improve department accountability and efficiency. This system is currently in the design phase, and is scheduled to go live in February Page 2

5 Approach Our approach consisted of the following phases: Understand and Document the Risks Our previous audit work over the last several annual internal audit plans has included obtaining an understanding of and documenting the processes and existing controls for the following IT areas at Brevard County: IT Planning and Organization Phase I IT Network Security Threat & Vulnerability Assessment Financial System Security During these internal audits, we have also performed system and application testing and analyzed results, making recommendations for improvement and assisting management with determining cost efficient means of securing IT assets and data, as well as complying with various laws, policies and other regulatory requirements. These projects have provided our IT professionals with timely, relevant and specific knowledge of the County s IT infrastructure, hardware and software. To assist management with application risk assessment, we conducted various interviews with senior management (operations and IT) and key technology and documentation management staff to discuss the specific objectives, scope and initial data requests needed to complete each phase of this risk assessment project. Three types of risk were considered during this phase of the IT risk assessment: inherent, control and residual risk. Inherent risk the level of risk that a problem can occur without considering internal controls. Inherent risks apply to the activity itself, not the organization or its people. Control risk is the threat that errors or irregularities in the underlying transactions will not be prevented, detected and/or corrected by the internal controls in place. Defining control risk includes determining how well the control in place mitigates the inherent risk, as well as whether the control in place is operating as intended. (A risk assessment does not include detailed testing of the controls in place.) Residual risk is defined as the risk that a problem could occur after existing controls have been applied. Residual risk is entity-specific, taking the organization s control environment into consideration and can vary within an organization based upon management s risk-appetite over time. Residual risk can also be defined as the level of risk that management has deemed acceptable and/or appropriate for the organization, given current available resources. Based upon interviews and various analyses of these systems and functions, our IT assurance professionals documented the associated risks as described above. The IT risk assessment process is illustrated on the following page. Page 3

6 Approach - continued Understand and Document the Risks - continued Information Technology Risk Assessment Activities Page 4

7 Approach - continued Detailed Analysis Management, with facilitation from our IT consultants, applied a three-step process for assigning risk factors, first determining the severity of the risks that apply to the environment without accounting for controls that may exist (inherent risk), understanding how existing controls mitigate the inherent risks identified (control risk), and then evaluating the level of risk that remains after controls have been applied (residual risk). Risk factors were considered and evaluated on a scale of high, moderate or low (or weak, moderate, strong). The criteria used for evaluating each risk factor are shown below. IMPACT CRITERIA LIKELIHOOD CRITERIA Step One: Inherent Risk Inherent risk is measured in terms of high, moderate, and low. The inherent risk factors used in this phase of our detailed analysis are defined as follows: External Market Reputation - The risk of exposure related to fluctuations in the market value and marketability of an organization s assets. For the County, this is more accurately defined as public perception risk. Financial - The risk that financial reporting is inaccurate, incomplete or untimely due to a variety of factors, including the pace of change, the amount of uncertainty, the presence of a large error, or the pressure on management to meet stakeholder expectations. Operational - The organization provides or is reliant on outsiders to provide processing activities supporting the delivery of services to end users. This risk addresses barriers to the timeliness, accuracy, authorization and completeness of these processing activities. Page 5

8 Approach - continued Detailed Analysis - continued Step One: Inherent Risk - continued Legal/Regulatory - The organization is subject to a variety of federal, state and local laws, regulations and directives. Failure to follow proscribed directives may result in substantial fines, restrictions in activities, and/or major concerns by regulators. Strategic - The risk that business objectives will not be achieved because business strategies are poorly defined and communicated or the organization is unable to execute these strategies due to inadequate organizational structure, infrastructure or alignment. Strategic risk is managed by appropriate organizational governance. Failure to adequately plan and execute against organizational goals may result in significant damage to the organization s reputation. Technology/Systems - This risk considers the level of use, sophistication, complexity, robustness, ease of use and speed and accuracy of recovery/replacement of systems. Addresses the overall importance of technology within the organization and the availability and quality of information the organization can access to support decision making, and the security around key information. People/Culture - This risk addresses cultural factors in the organization such as the ethical tone of management, the type of behaviors encouraged by and methods of reward used in its incentive systems and the approach to and consistency of enforcement of policies and procedures in the organization. The length, consistency and nature of business relationships with vendors and customers, including the handling of sensitive or confidential information and the risk that business interruption would seriously impact those relationships is considered. Finally, the selection, screening and training of its employees, the complexity of the learning curve to perform the organization s work and the nature and pace of turnover are key factors in this risk. Fraud - This risk addresses the structure of business activities and transaction processing and the organization s susceptibility to both internal and external fraud. The likelihood and ease of inappropriate management override as well as the timeliness, accuracy and completeness of fraud protection and monitoring activities should be considered. The nature (liquidity, value and access) of the products and assets of the business is critical to the assessment of fraud risk. Additionally, fraud risk incorporates intentional misstatement of financial reporting regardless of whether assets or products are misappropriated. Step Two: Control Risk Control risk is measured in terms of weak, moderate, and strong. The control risk factors used in this phase of our approach are defined as follows: Control Environment - The control environment sets the tone of an organization, influencing the control consciousness of its people. It is the foundation for all other components of internal control, providing discipline and structure. Control environment factors include the integrity, ethical values and competence of the entity s people; management s philosophy and operating style; the way management assigns authority and responsibility, and organizes and develops its people; and the attention and direction provided by the board of directors. Risk Assessment - Every entity faces a variety of risks from external and internal sources that must be assessed. Risk assessment is the identification and analysis of relevant risks to achievement of business objectives, forming a basis for determining how the risks should be managed. Because economic, industry, regulatory and operating conditions will continue to change, mechanisms are needed to identify and deal with the special risks associated with change. For each application or function rated at the County within this report, the control risk is rated as High (or weak controls) because risk assessment has not been previously performed. An ongoing risk assessment process should reduce the associated level of control risk. Page 6

9 Approach - continued Detailed Analysis - continued Step Two: Control Risk - continued Control Activities - Control activities are the policies and procedures that help ensure management directives are carried out. They help ensure that necessary actions are taken to address risks to achievement of the entity s objectives. Control activities occur throughout the organization at all levels and in all functions. They include activities such as segregation of duties, authorizations, security of assets, reporting and reviews of operating performance and documentation. Information and Communication - Pertinent information must be identified, captured and communicated in a form and timeframe that enables people to carry out their responsibilities. Information systems produce reports that make it possible to run and control the business. Effective communication also must occur in a broader sense, flowing down, across and up the organization. All personnel must receive information needed to make informed business decisions. Monitoring - Internal control systems need to be monitored. This is accomplished through ongoing monitoring activities, separate evaluations or a combination of the two. There is synergy and linage among these components, forming an integrated system that reacts dynamically to changing conditions. The internal control system is most effective when controls are built into the entity s infrastructure and are a part of the essence of the enterprise. Step Three: Residual Risk The Residual Risk rating shown in the illustrative heat maps on the following pages is a subjective evaluation of the severity of the concerns related to each application, given the controls in place and the likelihood of failure, as well as the potential impact on operations. Residual risk is measured in terms of high, moderate and low. Items rated High are considered to be of immediate concern and could cause significant operational issues if proposed next steps are not addressed in a timely manner. Items rated Moderate may also cause operational issues and do not require immediate attention, but proposed next steps should be addressed as soon as possible. Items rated Low could escalate into operational issues, but can be addressed through the normal course of conducting business. It should be noted that Residual Risk is not indicative of a security risk unless explicitly stated. Additionally, a risk assessment does not include detailed testing of the controls in place. Reporting Once documented, we conduct a formal exit conference with the appropriate management and support staff and discuss the results of the risk assessments and next steps that should be performed for each high risk application or function. While we obtain an understanding of the controls in place in order to assess the risks, our approach does not include testing the existing controls of these systems. To further enhance the value of this risk assessment process, we document each of these systems specific risks controls and perform transaction walkthroughs as appropriate to provide management with the process documentation needed for ongoing risk assessment and control design evaluation. The confidential report contains a risk and control matrix for each application as well as an illustrated Heat Map to identify the risk areas. Page 7

10 Risk Assessment: Financial System This application suite is the primary financial management and reporting application for the County. Inherent risk that is, the risk associated with the application without considering any controls that are in place - is assessed as High due to being the system of record for the finance-related activities of the County, as well as the significant number of transactions that flow through the system, and the nature of the transactions and information in the system. The system was the focus of a security review in 2008, with one remaining follow-up issue related to security policies. The specific applications in use at the County include the following: a. Logistics Modules currently in use - Materials Management Creating purchase requisitions and purchase orders - Plant Maintenance Tracking facilities maintenance and work orders Modules currently not in use - Customer Service Tracking billing and contracts b. Accounting Financial Accounting Modules currently in use - General Ledger Daily financial transactions - Accounts Receivable Billing for limited external agencies for various services - Accounts Payable - Banks Payroll banks for employees - Fixed Assets Asset management inventory - Special Purpose Ledger Use for reporting, e.g., CAFR Modules currently not in use - Lease Accounting Accounting-relevant aspects of the leasing deal c. Accounting Treasury Modules currently used - Controlling Cost center information - Public Sector Management Budget functions and availability control Modules currently not in use - Investment Management Enterprise project management - Real Estate Management Management of property acquisition, disposal and portfolio management - Flexible Real Estate Management Contract management and space management d. Human Resources (All modules currently in use) Personnel Management Time Management Payroll Training and Event Management Organizational Management Departmental structure of the County Analysis and Results Included in the Confidential Report Page 8

11 Risk Assessment: Permitting Application The permitting application is the primary software utilized to track the approval process for permits, developments and contractor licenses. Additionally, it is used to track the enforcement process for code and contractor violations. Inherent risk that is, the risk associated with the application without considering any controls that are in place - has been assessed as Moderate due to being the mechanism for tracking permits, required reviews and associated fees, as well as interfacing with the financial system. This application could be high risk, but has been categorized at moderate given the reduced quantity of permits currently processed through the system. The permitting application is composed of four modules that support wireless access: a. Building Code Building plan review and permitting (residential and commercial) New construction inspection Special event permitting Bingo licensing Address assignment - Street naming and renaming - Legal descriptions of property b. Land Development Site plan and subdivision review and approval Unpaved roads, flag stem lots and easements Right-of-way and easement permitting Central cashier Impact fees c. Licensing Contractor licensing certification and investigation Investigation of unlicensed contractors d. Code Enforcement Investigate zoning and solid waste complaints. Investigate immediate health and safety issues brought to their attention. Assist citizens with compliance measures before resorting to prosecution. Assist the public courteously and expeditiously with all matters related to code violations. Refer other complaints to the proper agency for follow-up investigation, e.g., building, environmental health, natural resources, road and bridge, occupational license, signs, contractors, water and land development codes. Analysis and Results Included in the Confidential Report Page 9

12 Risk Assessment: Solid Waste Management (SWMD) Application SWMD is responsible for the operation of the County s landfills to provide for the disposal of solid waste that is generated from households and commercial businesses in Brevard County. SWMD will bill for various services that include the following: Collection and disposal charges for garbage, yard waste and recycling: The collection charge only applies to residents in the unincorporated areas of the county (i.e., areas not within city limits) and the disposal charge applies to all residents and commercial activities. The collection and disposal charges are put on the annual tax bill under the non ad-valorem special assessments. Properties that have been issued a Certificate of Occupancy after October 1, will receive a prorated assessment for these services. The inherent risk that is, the risk associated with the application without considering any controls that are in place - is rated as High risk due to the process is decentralized (i.e., accounting function does not occur within finance department), as well as other factors. Analysis and Results Included in the Confidential Report Page 10

13 Risk Assessment: Library Information Systems Application The Integrated Library Systems (ILS) sole purpose is to manage library business. The main application modules allow patrons to: Borrow library materials Return library materials Track patron holds Request fines and fees This application s inherent risk that is, the risk associated with the application without considering any controls that are in place - is rated as Moderate. There are no material financial transactions associated with ILS. However, it is used to track and monitor library assets and is relied upon by the public for services. Analysis and Results Included in the Confidential Report Page 11

14 Risk Assessment: Utility Services Work Management Application The Utility Services application is a complete work management system for Brevard County wastewater operations that is currently under development. Once implemented, the application will help automate current manual processes and will support the management of work flow processes, assist with FEMA reporting, track and report DEP malfunction reports, and improve department accountability and efficiency. This system is currently in the design phase. Go live is scheduled in February Inherent risk that is, the risk associated with the application without considering any controls that are in place - is rated as High for this application. The Utility Services department is currently implementing the following modules: Asset Control Used to input and track assets relating to: - Water - Plant - Sewer Work Management Project and work order time entry and tracking Customer Service Citizen relationship manager and service request Inventory Control Used to track parts and inventory (limited functionality at this time) for: - Fleet - Trailers - Pumps Map Drawer Mapping tool user interface to GIS and to engage work management GeoAdmin Management interface tied to ARC IVIS (County s GIS software) Analysis and Results Included in the Confidential Report Page 12

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.

More information

A Risk-Based Audit Strategy November 2006 Internal Audit Department

A Risk-Based Audit Strategy November 2006 Internal Audit Department Mental Health Mental Retardation Authority of Harris County ENTERPRISE RISK MANAGEMENT A Framework For Assessing, Evaluating And Measuring Our Agency s Risk A Risk-Based Audit Strategy November 2006 Internal

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

Fraud Prevention and Deterrence

Fraud Prevention and Deterrence Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining

More information

Module 6 Documenting Processes and Controls

Module 6 Documenting Processes and Controls A logical place to begin any comprehensive evaluation of internal controls is at the top entity-level controls that might have a pervasive effect on the organization. This includes a consideration of factors

More information

Guide to Internal Control Over Financial Reporting

Guide to Internal Control Over Financial Reporting Guide to Internal Control Over Financial Reporting The Center for Audit Quality prepared this Guide to provide an overview for the general public of internal control over financial reporting ( ICFR ).

More information

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK

THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK THE SOUTH AFRICAN HERITAGE RESOURCES AGENCY ENTERPRISE RISK MANAGEMENT FRAMEWORK ACCOUNTABLE SIGNATURE AUTHORISED for implementation SIGNATURE On behalf of Chief Executive Officer SAHRA Council Date Date

More information

Executive Summary... 2. Background... 3-5. Objectives and Approach... 6-7. Issues Matrix... 8-9. Observations and Considerations...

Executive Summary... 2. Background... 3-5. Objectives and Approach... 6-7. Issues Matrix... 8-9. Observations and Considerations... Internal Audit Committee of Brevard County, Florida Internal Audit of Asset Management Prepared By: Internal Auditors of Brevard County June 5, 2009 Table of Contents Transmittal Letter... 1 Executive

More information

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: 1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org STAFF VIEWS AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN

More information

REPORT NO. 2014-022 OCTOBER 2013 SEMINOLE STATE COLLEGE OF FLORIDA. Operational Audit

REPORT NO. 2014-022 OCTOBER 2013 SEMINOLE STATE COLLEGE OF FLORIDA. Operational Audit REPORT NO. 2014-022 OCTOBER 2013 SEMINOLE STATE COLLEGE OF FLORIDA Operational Audit BOARD OF TRUSTEES AND PRESIDENT Members of the Board of Trustees and President who served during the 2012-13 fiscal

More information

Assessing Credit Risk

Assessing Credit Risk Assessing Credit Risk Objectives Discuss the following: Inherent Risk Quality of Risk Management Residual or Composite Risk Risk Trend 2 Inherent Risk Define the risk Identify sources of risk Quantify

More information

How To Audit A Company

How To Audit A Company INTERNATIONAL STANDARD ON AUDITING 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial statements for

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315 INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial

More information

RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide

RISK BASED AUDITING: A VALUE ADD PROPOSITION. Participant Guide RISK BASED AUDITING: A VALUE ADD PROPOSITION Participant Guide About This Course About This Course Adding Value for Risk-based Auditing Seminar Description In this seminar, we will focus on: The foundation

More information

APPENDIX A NCUA S CAMEL RATING SYSTEM (CAMEL) 1

APPENDIX A NCUA S CAMEL RATING SYSTEM (CAMEL) 1 APPENDIX A NCUA S CAMEL RATING SYSTEM (CAMEL) 1 The CAMEL rating system is based upon an evaluation of five critical elements of a credit union's operations: Capital Adequacy, Asset Quality, Management,

More information

COSO Internal Control Integrated Framework (2013)

COSO Internal Control Integrated Framework (2013) COSO Internal Control Integrated Framework (2013) The Committee of Sponsoring Organizations of the Treadway Commission (COSO) released its updated Internal Control Integrated Framework (2013 Framework)

More information

Aberdeen City Council IT Asset Management

Aberdeen City Council IT Asset Management Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates

More information

Sarbanes-Oxley Control Transformation Through Automation

Sarbanes-Oxley Control Transformation Through Automation Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 info@bluelance.com

More information

Sample Financial institution Risk Management Policy 2011

Sample Financial institution Risk Management Policy 2011 Sample Financial institution Risk Management Policy 2011 1 Contents Risk Management Program...2 Internal Control and Risk Management Diagram... 2 General Control Environment... 2 Specific Internal Control

More information

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug

More information

Communicating Internal Control Related Matters Identified in an Audit

Communicating Internal Control Related Matters Identified in an Audit Communicating Internal Control 1843 AU Section 325 Communicating Internal Control Related Matters Identified in an Audit (Supersedes SAS No. 112.) Source: SAS No. 115. Effective for audits of financial

More information

On the Setting of the Standards and Practice Standards for. Management Assessment and Audit concerning Internal

On the Setting of the Standards and Practice Standards for. Management Assessment and Audit concerning Internal (Provisional translation) On the Setting of the Standards and Practice Standards for Management Assessment and Audit concerning Internal Control Over Financial Reporting (Council Opinions) Released on

More information

Audit of the Policy on Internal Control Implementation

Audit of the Policy on Internal Control Implementation Audit of the Policy on Internal Control Implementation Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada February 18, 2013 1 TABLE OF

More information

Audit of the Test of Design of Entity-Level Controls

Audit of the Test of Design of Entity-Level Controls Audit of the Test of Design of Entity-Level Controls Canadian Grain Commission Audit & Evaluation Services Final Report March 2012 Canadian Grain Commission 0 Entity Level Controls 2011 Table of Contents

More information

AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL

AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL AUDIT REPORT JUNE 2010 TABLE OF CONTENTS EXCUTIVE SUMMARY... 3 1 INTRODUCTION... 5 1.1 AUDIT OBJECTIVE. 5 1.2 SCOPE...5 1.3 SUMMARY

More information

GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES

GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES 20 th February, 2013 To Insurance Companies Reinsurance Companies GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES These guidelines on Risk Management and Internal

More information

YEARENDED31DECEMBER2013 RISKMANAGEMENTDISCLOSURES

YEARENDED31DECEMBER2013 RISKMANAGEMENTDISCLOSURES RISKMANAGEMENTDISCLOSURES 2015 YEARENDED31DECEMBER2013 ACCORDINGTOCHAPTER7(PAR.34-38)OFPARTCANDANNEXXIOFTHECYPRUSSECURITIES ANDEXCHANGECOMMISSIONDIRECTIVEDI144-2007-05FORTHECAPITALREQUIREMENTSOF INVESTMENTFIRMS

More information

University Audit and Compliance. Internal Controls Enterprise-Wide Risk Assessment

University Audit and Compliance. Internal Controls Enterprise-Wide Risk Assessment Internal Controls Enterprise-Wide Risk Assessment Balancing Risk and Controls In order to achieve goals and objectives, management needs to effectively balance risks and controls. Control procedures need

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

Enterprise Risk Management

Enterprise Risk Management Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's

More information

Antifraud program and controls assessment grid*

Antifraud program and controls assessment grid* Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR

More information

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL STATE BOARD OF ACCOUNTS 302 West Washington Street Room E418 Indianapolis, Indiana 46204-2769 Issued January 2011 Revised April 2012 TABLE OF CONTENTS

More information

September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control

September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value

More information

Internal Auditing Guidelines

Internal Auditing Guidelines Internal Auditing Guidelines Recommendations on Internal Auditing for Lottery Operators Issued by the WLA Security and Risk Management Committee V1.0, March 2007 The WLA Internal Auditing Guidelines may

More information

Developing an Effective Enterprise Risk Management Program

Developing an Effective Enterprise Risk Management Program Developing an Effective Enterprise Risk Management Program Jay Brietz, CPA and CIA Senior Manager This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

[RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06]

[RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06] SECURITIES AND EXCHANGE COMMISSION 17 CFR PART 241 [RELEASE NOS. 33-8810; 34-55929; FR-77; File No. S7-24-06] Commission Guidance Regarding Management s Report on Internal Control Over Financial Reporting

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

Environmental Services Solid Waste Management Division Audit Report

Environmental Services Solid Waste Management Division Audit Report Solid Waste Management Division Audit Report Issued by the March 10, 2006 EXECUTIVE SUMMARY The has concluded its audit of the Solid Waste Management (SWM) Division. Based on the results of the audit,

More information

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Understanding the Entity and Its Environment 267 AU-C Section 315 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Source: SAS No. 122; SAS No. 128. Effective

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Overview Discussion Questions 1) Does your organization follow a specific risk management model? If so, which one? Do you think this model adequately addresses the risks your organization

More information

MIAMI UNIVERSITY Internal Audit & Consulting Services Risk Discussion Questionnaire GENERAL INFORMATION

MIAMI UNIVERSITY Internal Audit & Consulting Services Risk Discussion Questionnaire GENERAL INFORMATION MIAMI UNIVERSITY Internal Audit & Consulting Services Risk Discussion Questionnaire Department or Process: Contact Person: Contact Phone: Date Completed: GENERAL INFORMATION 1. What is the Purpose/Mission/Objective

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452

Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452 Mecklenburg County Department of Internal Audit PeopleSoft Application Security Audit Report 1452 February 9, 2015 Internal Audit s Mission Through open communication, professionalism, expertise and trust,

More information

CHAPTER 3 FINANCIAL MANAGEMENT SYSTEMS: POLICY, ROLES AND RESPONSIBILITIES FOR CONFORMANCE, EVALUATION, AND REPORTING

CHAPTER 3 FINANCIAL MANAGEMENT SYSTEMS: POLICY, ROLES AND RESPONSIBILITIES FOR CONFORMANCE, EVALUATION, AND REPORTING CHAPTER 3 FINANCIAL MANAGEMENT SYSTEMS: POLICY, ROLES AND RESPONSIBILITIES FOR CONFORMANCE, EVALUATION, AND REPORTING 0301. GENERAL. By statute the head of a Federal agency is responsible for establishing

More information

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT

SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing

More information

Fraud Control Theory

Fraud Control Theory 13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC Enterprise Risk Management Process Improvement 2 Contact Information Contact Information Chad Knutson Senior Information Security Consultant CISSP, CISA, CRISC Phone: 605-480-3366 chad.knutson@protectmybank.com

More information

CLERK & COMPTROLLER, PALM BEACH COUNTY CLASS DESCRIPTION CLASSIFICATION TITLE: MANAGER FINANCE SERVICES GENERAL DESCRIPTION OF DUTIES

CLERK & COMPTROLLER, PALM BEACH COUNTY CLASS DESCRIPTION CLASSIFICATION TITLE: MANAGER FINANCE SERVICES GENERAL DESCRIPTION OF DUTIES CLERK & COMPTROLLER, PALM BEACH COUNTY CLASS DESCRIPTION CLASSIFICATION TITLE: MANAGER FINANCE SERVICES GENERAL DESCRIPTION OF DUTIES Under general direction, the purpose of the position is to manage the

More information

Internal Audit Committee of Brevard County, Florida Internal Audit of Timekeeping and Payroll Process

Internal Audit Committee of Brevard County, Florida Internal Audit of Timekeeping and Payroll Process Internal Audit Committee of Brevard County, Florida Internal Audit of Timekeeping and Payroll Process May 31, 2011 Prepared By: Table of Contents Transmittal Letter... 1 Executive Summary... 2-4 Background...

More information

2015-16 Internal Control Questionnaire and Assessment

2015-16 Internal Control Questionnaire and Assessment Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity September 9, 2015 107 East Madison Street Caldwell Building Tallahassee, Florida 32399 www.floridajobs.org TABLE

More information

IPPF Practice Guide. the control environment

IPPF Practice Guide. the control environment Auditing the control environment APRIL 2011 Table of Contents Executive Summary... 1 Introduction... 2 An Organization s Control Environment... 2 Scope and Approach to... 3 Practical Considerations in...

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

RISK MANAGEMENT AND COMPLIANCE

RISK MANAGEMENT AND COMPLIANCE RISK MANAGEMENT AND COMPLIANCE Contents 1. Risk management system... 2 1.1 Legislation... 2 1.2 Guidance... 3 1.3 Risk management policy... 4 1.4 Risk management process... 4 1.5 Risk register... 8 1.6

More information

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management

More information

Federal Home Loan Bank Membership Version 1.0 March 2013

Federal Home Loan Bank Membership Version 1.0 March 2013 Introduction The Federal Home Loan Banks (FHLBanks) are cooperative institutions owned by members. The Federal Home Loan Bank Act of 1932 (FHLBank Act) created the Federal Home Loan Bank System to support

More information

Missouri State Auditor March 2014 http://auditor.mo.gov Report No. 2014-016

Missouri State Auditor March 2014 http://auditor.mo.gov Report No. 2014-016 Thomas A. Schweich Missouri State Auditor FOLLOW-UP REPORT ON AUDIT FINDINGS City of Marshfield March 2014 Report No. 2014-016 http://auditor.mo.gov Follow-Up Report on Audit Findings Table of Contents

More information

An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements

An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements Examination of an Entity s Internal Control 1403 AT Section 501 An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements Source:

More information

Integration of Risk Management and Internal Audit. Chartered Institute of Management Accountants, New Zealand

Integration of Risk Management and Internal Audit. Chartered Institute of Management Accountants, New Zealand Integration of Risk Management and Internal Audit Chartered Institute of Management Accountants, New Zealand Contents Understanding the three lines of defense governance model What is Risk? Risk Management

More information

OFFICE OF FINANCIAL REGULATION COLLECTION AGENCY REGISTRATIONS MORTGAGE-RELATED AND CONSUMER COLLECTION AGENCY COMPLAINTS PRIOR AUDIT FOLLOW-UP

OFFICE OF FINANCIAL REGULATION COLLECTION AGENCY REGISTRATIONS MORTGAGE-RELATED AND CONSUMER COLLECTION AGENCY COMPLAINTS PRIOR AUDIT FOLLOW-UP REPORT NO. 2013-031 OCTOBER 2012 OFFICE OF FINANCIAL REGULATION COLLECTION AGENCY REGISTRATIONS MORTGAGE-RELATED AND CONSUMER COLLECTION AGENCY COMPLAINTS PRIOR AUDIT FOLLOW-UP Operational Audit COMMISSIONER

More information

Integrated Risk Management:

Integrated Risk Management: Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)

More information

Table of Contents. Transmittal Letter... 1. Executive Summary... 2-3. Background... 4-5. Objectives and Approach... 6. Issues Matrix...

Table of Contents. Transmittal Letter... 1. Executive Summary... 2-3. Background... 4-5. Objectives and Approach... 6. Issues Matrix... Internal Audit Committee of Brevard County, Florida Internal Audit Review of Accounts Payable Prepared By: Internal Auditors of Brevard County September 22, 2010 Table of Contents Transmittal Letter...

More information

Plan for the audit of the 2011 financial statements

Plan for the audit of the 2011 financial statements INTERNATIONAL TRAINING CENTRE OF THE ILO Board of the Centre 73rd Session, Turin, 3-4 November 2011 CC 73/5/2 FOR INFORMATION FIFTH ITEM ON THE AGENDA Plan for the audit of the 2011 financial statements

More information

[300] Accounting and internal control systems and audit risk assessments

[300] Accounting and internal control systems and audit risk assessments [300] Accounting and internal control systems and audit risk assessments (Issued March 1995) Contents Paragraphs Introduction 1 12 Inherent risk 13 15 Accounting system and control environment 16 23 Internal

More information

10-005 Enterprise Risk Management

10-005 Enterprise Risk Management 10-005 Enterprise Risk Management Current update: 09/16/10 Original Issuance: 03/31/08 Purpose This policy provides guidance and direction to State Board of Administration business unit heads for identifying,

More information

INTERNATIONAL STANDARD ON REVIEW ENGAGEMENTS 2410 REVIEW OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY CONTENTS

INTERNATIONAL STANDARD ON REVIEW ENGAGEMENTS 2410 REVIEW OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY CONTENTS INTERNATIONAL STANDARD ON ENGAGEMENTS 2410 OF INTERIM FINANCIAL INFORMATION PERFORMED BY THE INDEPENDENT AUDITOR OF THE ENTITY (Effective for reviews of interim financial information for periods beginning

More information

PRACTICE GUIDE. Formulating and Expressing Internal Audit Opinions

PRACTICE GUIDE. Formulating and Expressing Internal Audit Opinions PRACTICE GUIDE Formulating and Expressing Internal Audit Opinions 2 of 23 Table of Contents 1. Executive Summary... 1 2. Introduction... 2 3. Planning the Expression of an Opinion... 3 3.1 Expressing an

More information

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office. GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers

More information

4 Testing General and Automated Controls

4 Testing General and Automated Controls 4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn

More information

REQUEST FOR PROPOSALS (RFP) FOR FINANCIAL AUDIT SERVICES

REQUEST FOR PROPOSALS (RFP) FOR FINANCIAL AUDIT SERVICES REQUEST FOR PROPOSALS (RFP) FOR FINANCIAL AUDIT SERVICES Issued by: City of Clewiston 115 W. Ventura Avenue Clewiston, Florida 33440 September 30, 2015 1 REQUEST FOR PROPOSALS FOR FINANCIAL AUDIT SERVICES

More information

Risk Assessment & Enterprise Risk Management

Risk Assessment & Enterprise Risk Management Risk Assessment & Enterprise Risk 1 Healthcare Corporate Governance Today s environment requires building a culture of risk awareness and management of risk across the organization, while formulating less

More information

Oversight of Information Technology Projects. Information Technology Audit

Oversight of Information Technology Projects. Information Technology Audit O L A OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA FINANCIAL AUDIT DIVISION REPORT Oversight of Information Technology Projects Information Technology Audit May 29, 2009 Report 09-19 FINANCIAL

More information

Frequently Asked Questions in Identifying and Assessing Prospective Risks

Frequently Asked Questions in Identifying and Assessing Prospective Risks To: Financial Examiners From: NAIC Examination Unit Staff Date: May 4, 2015 Re: Frequently Asked Questions in Identifying and Assessing Prospective Risks The following FAQ provides information on common

More information

Fraud Risk Management Procedures

Fraud Risk Management Procedures Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency

More information

Chapter 15 Auditing the Expenditure Cycle

Chapter 15 Auditing the Expenditure Cycle Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases

More information

Operational Risk Management Policy

Operational Risk Management Policy Operational Risk Management Policy Operational Risk Definition A bank, including a development bank, is influenced by the developments of the external environment in which it is called to operate, as well

More information

NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE

NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE STAATSKOERANT, 19 DESEMBER 2014 No. 38357 3 BOARD NOTICE NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE LONG-TERM INSURANCE ACT, 1998 (ACT NO. 52

More information

Matthew E. Breecher Breecher & Company PC November 12, 2008

Matthew E. Breecher Breecher & Company PC November 12, 2008 Applying COSO s Enterprise Risk Management Integrated Framework Matthew E. Breecher Breecher & Company PC November 12, 2008 The basic outline for this presentation was provided by: Objectives for the session:

More information

How To Audit A Financial Statement

How To Audit A Financial Statement INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Activity Code 12500 Material Management and Accounting System (MMAS) Version 9.10, dated September 2015 B-1 Planning Considerations

Activity Code 12500 Material Management and Accounting System (MMAS) Version 9.10, dated September 2015 B-1 Planning Considerations Activity Code 12500 Material Management and Accounting System (MMAS) Version 9.10, dated September 2015 B-1 Planning Considerations Audit Specific Independence Determination Members of the audit team and

More information

Control Environment Questionnaire

Control Environment Questionnaire Control Environment Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks INTEGRITY AND ETHICAL VALUES Management must convey the message that integrity and ethical values cannot be

More information

AUDIT REPORT. Bonneville Power Administration s Real Property Services

AUDIT REPORT. Bonneville Power Administration s Real Property Services U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Bonneville Power Administration s Real Property Services OAI-M-16-04 January 2016 Department of Energy

More information

CFE 2. Enterprise Risk Management. Study Guide - Supplemental Background Material

CFE 2. Enterprise Risk Management. Study Guide - Supplemental Background Material P a g e 1 CFE 2 Enterprise Risk Management Study Guide - Supplemental Background Material The passing score for this test is 74% Reference Guides: Enterprise Risk Management Best Practices: From Assessment

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

REPORT NO. 2013-051 DECEMBER 2012 UNIVERSITY OF CENTRAL FLORIDA. Operational Audit

REPORT NO. 2013-051 DECEMBER 2012 UNIVERSITY OF CENTRAL FLORIDA. Operational Audit REPORT NO. 2013-051 DECEMBER 2012 UNIVERSITY OF CENTRAL FLORIDA Operational Audit BOARD OF TRUSTEES AND PRESIDENT Members of the Board of Trustees and President who served during the 2011-12 fiscal year

More information

Sarbanes-Oxley Section 404: Management s Assessment Process

Sarbanes-Oxley Section 404: Management s Assessment Process Sarbanes-Oxley Section 404: Management s Assessment Process Frequently Asked Questions ADVISORY Contents 1 Introduction 2 Providing a Road Map for Management 3 Questions and Answers 3 Section I. Planning

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information

Interim Audit Report. Borough of Broxbourne Audit 2010/11

Interim Audit Report. Borough of Broxbourne Audit 2010/11 Interim Audit Report Borough of Broxbourne Audit 2010/11 The Audit Commission is an independent watchdog, driving economy, efficiency and effectiveness in local public services to deliver better outcomes

More information

Environmental Services Solid Waste Management Division Follow-Up Audit

Environmental Services Solid Waste Management Division Follow-Up Audit Environmental Services Solid Waste Management Division Follow-Up Audit Issued by the February 26, 2007 EXECUTIVE SUMMARY The Internal Audit Department conducted a follow-up audit on the Environmental Services

More information

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL Evaluation and Inspection Services Memorandum May 5, 2009 TO: FROM: SUBJECT: James Manning Acting Chief Operating Officer Federal Student

More information

Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français.

Guidance Note: Corporate Governance - Board of Directors. March 2015. Ce document est aussi disponible en français. Guidance Note: Corporate Governance - Board of Directors March 2015 Ce document est aussi disponible en français. Applicability The Guidance Note: Corporate Governance - Board of Directors (the Guidance

More information

Master Document Audit Program

Master Document Audit Program Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers

Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers Morgan Stanley Policy for the Management of Third Party Residential Mortgage Servicing Providers Title Policy for the Management of Third Party Residential Mortgage Servicing Providers Effective Date Owner

More information

Arizona State Real Estate Department

Arizona State Real Estate Department A REPORT TO THE ARIZONA LEGISLATURE Financial Audit Division Procedural Review Arizona State Real Estate Department As of May 16, 2006 Debra K. Davenport Auditor General The Auditor General is appointed

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, CPA, CIA AUDITOR GENERAL DATA SECURITY USING MOBILE DEVICES PERFORMANCE AUDIT OF MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF DATA SECURITY USING MOBILE DEVICES DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET January 2015 Doug A. Ringler, CPA, CIA AUDITOR

More information